Chapter 9 Internet Law Social Media And Piracy Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Undertaking spam, spyware and fraud

Allows FTC to work with foreign agencies investigating and prosecuting

International cooperation
Enforcement beyond borders act

A

uS SAFE WEB ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Have significant protection to owners of copyrights in digital information

Makes circumvention of encryption software or any anti-piracy software criminal and civil prosecutable

Limits liability of ISP unless they are aware of aubscribera violation

A

Digital millennium copyright ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amended federal wiretapping law to cover electric forms communication

Applies to communications via social media

Also prohibits prohibits the use/disclosure of any information obtained by the interception

A

Electronic communications privacy act

ECPA
Excludes communications through devices that an employer provides ( in the ordinary course of business)

Allows employers to avoid liability if employees consent to having electronic communications monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prevents cell phone companies and social media networks from divulging private communications to certain entities or individuals

Criminal and civil sanctions for violation

Compensatory damages and punitive possible

A

Stored communications act

SCA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most common cyber tort

A
Online defamation
( often hard to find perp.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is negative speech on Social media protected speech ?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

No provider or user of interactive computer service shall be treated as publisher of info provided by a third party

A

CDA

Communications decency act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Investigates consumer complaints of privacy violations

A

FTC

Federal trade commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can employers normally ask for social media passwords

A

Yes excluding four states that passed legislation in 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2003 congress enacted the CAN SPAM act which effectively
Eliminated unsolicited emails

T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Because the can spam act only applies to emails originating in the U.S. congress enacted the —

A

U.S. Safe web act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loss of ——- occurs when someone uses a domain name similar to yours

A

Goodwill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The act of registering a domain name that is the same as or similar to the trademark of another and then offering to sell that domain name back to the trademark owner

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The act of buying names that are similar to well known names exept for slight misspellings

A

Typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using another’s trademark in a meta-tag will normally constitute trademark infringement

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A claim of trademark dilution requires proof that consumers will likely be confused by a connection between the unauthorized use and the Mark

A

False !

17
Q

The sharing of resources amoung multiple computers without nessisailly requiring a central network server

A

Peer to peer networking

18
Q

A network that can be used by perso. Loaches around the country or globe to share computer files

A

Distributed network

19
Q

The delivery of users of on demand services from third party servers over a network

A

Cloud computing

20
Q

Social media posts that contain trademarked images and copyrighted materials typically infringe the intellectual property rights of others

A

True

21
Q

Social media posts can be used to detect and prosecute criminals, further investigation by federal regulators into illegal activities

T or F

A

True

22
Q

The business extension the the electronics communications privacy act permits employers to monitor employees personal communications

T or F

A

False

23
Q

Which act prevents cell phone companies and social

Media networks from divulging private communications the certain entities and individuals

A

Stored communications act

24
Q

To protect from would be cybersquatting and typo squatters large corps may have to

A

Register 1000’s of domain names accross the globe

25
Q

To test computer security and conduct encryption research one can circumvent the exeptional software and anti-piracy provisions

A

True

26
Q

Downloading music onto your computers RAM without authorization is

A

Copyright infringement

27
Q

Registered domain names are protected as

A

Trademarks

28
Q

What does the top level part of a domain name indicate

A

The type of entity that operates the sight

29
Q

Applies to commercial and electronic mail messages
-false return addresses
-misleading or deceptive information
Randomly generated e-mail addresses/ harvesting

A

CAN-SPAM ACT

Controlling the assault of non-solicited porn and marketing